Found 1,684 presentations matching your search
As drones continue to advance in capabilities and come into wider and wider use by both legitimate u...
Escalate Privileges in Windows: Addressing a Critical Security Vulnerability In Windows, the proces...
Cyber security is vital because it covers everything that has to do with protecting our data from cy...
Network and system security are essential in the complex online plays between defenders and attacker...
Steganography is a camouflage method of a message or an activity. It hides the malicious code which ...
Penetration testing (pen testing) is one of the most critical aspects of cybersecurity. It involves ...
This article presents a machine learning framework for Android malware detection and categorization....
WAFs act as a shield against these threats by implementing security policies tailored to the specifi...
The world of technology is constantly evolving, and with that comes new challenges. Malicious actors...
Network security threats are malicious activities aimed at exploiting vulnerabilities in a network t...
Cyber Attacks: A Complete Guide to Threats, Types, and Protection In the digital era, cyber attacks...
This presentation explores the impact of HTML injection attacks on web applications, detailing how a...
Linkey is not flagged as a virus, but antimalware software has picked up the extension due to its ma...
A Trojan virus is a type of malware that disguises itself as a legitimate file or program to trick u...
This project focuses on identifying a critical Cross-Site Scripting (XSS) vulnerability present on t...
Web application penetration testing, often referred to as web app pen testing or simply web app test...